Ping Identity Launches Just-in-Time Privileged Access

Strong Identification Trifecta solutions dynamic enterprise wants inside a centralized platform 

Ping Identity, a frontrunner in securing digital identities for the world’s largest enterprises, introduced its new Simply-in-time Privileged Entry capabilities inside the Ping Identity Platform, providing complete capabilities throughout all three classes of identification: Entry Administration (AM), Identification Governance and Administration (IGA), and Privileged Entry Administration (PAM). Utilizing centralized identification controls in a single platform, this trifecta empowers clients with a extra complete suite of options to guard and handle their digital environments. 

“As enterprises embrace multi-cloud methods, the dimensions and complexity of cloud permissions are increasing sooner than ever. Conventional, vault-based PAM options can’t sustain with at present’s dynamic enterprise wants,” stated Peter Barker, Chief Product Officer at Ping Identification. “With the addition of PAM capabilities, we’re empowering organizations to undertake just-in-time (JIT) privileged entry and clear up a broader set of identification and safety challenges – all inside a unified platform.”

These PAM capabilities allow safer management over exploding cloud permissions by using a Trusted Platform Module (TPM) to guard privileged periods on the device-level, which may be each agentless and agent-based, relying on buyer wants. With Ping’s privileged entry choices, clients profit from: 

  • JIT Privileged Entry: Finish-users can securely request and procure time-bound entry to cloud environments (AWS, GCP, Azure), in addition to cloud or on-premises servers, databases, Kubernetes and different important sources in a user-friendly portal, adhering to zero belief finest practices.
  • Passwordless Entry: Authentication to all of the sources (e.g. Server SSH, RDP, IAM) is dealt with in a passwordless method, eliminating the necessity for static credentials (e.g. SSH Keys, RDP password).
  • Ensured Compliance: Session recordings and audit logs for privileged entry help compliance with laws reminiscent of SOX, SOC2, GDPR, HIPAA, and PCI-DSS.
  • Hybrid Infrastructure Help: JIT granular entry to entitlements, roles and sources in AWS, Azure, GCP, and Kubernetes with context-aware insurance policies and actual time authorization.

“We’re at a important inflection level, the place AI is reshaping the panorama and eroding belief,” stated Andre Durand, CEO and founding father of Ping Identification.  “Ping is now uniquely positioned to equip organizations with next-generation privileged entry capabilities—defending entry to cloud infrastructure and securing the total spectrum of identities from a single, trusted platform.”  

Ping Identification’s privileged entry capabilities are made doable by the current acquisition of Procyon, a cloud-native startup based in 2021 by Sukhesh Halemane, Suman Sharma, and Mahantesh Pattanshetti. The corporate was based with a imaginative and prescient to allow easy, seamless, and safe privileged entry to each cloud and on-prem infrastructure. Procyon was designed for contemporary DevOps workflows, providing an answer that’s simple to deploy, use, and keep. Its mission targeted on rising productiveness for each safety and growth groups whereas offering excessive assurance safety for enterprises from identification breaches.

The publish Ping Identity Launches Just-in-Time Privileged Access first appeared on AI-Tech Park.

Similar Posts